mirror of
https://github.com/zulip/zulip.git
synced 2025-11-02 21:13:36 +00:00
docs: Add missing spaces around code spans.
Signed-off-by: Anders Kaseorg <anders@zulip.com>
This commit is contained in:
committed by
Anders Kaseorg
parent
10ef308848
commit
a13e42f18a
@@ -747,7 +747,7 @@ integration](../production/scim.md).
|
||||
`https://authentik.company/application/saml/<application slug>/sso/binding/redirect/` where `<application slug>`
|
||||
is the application slug you've assigned to this application in Authentik settings (e.g `zulip`).
|
||||
1. Update the attribute mapping in your new entry in `SOCIAL_AUTH_SAML_ENABLED_IDPS` to match how
|
||||
Authentik specifies attributes in its`SAMLResponse`:
|
||||
Authentik specifies attributes in its `SAMLResponse`:
|
||||
|
||||
```
|
||||
"attr_user_permanent_id": "http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress",
|
||||
@@ -791,7 +791,7 @@ this with another IdP.
|
||||
Disable `Force POST Binding`, as Zulip only supports the Redirect binding.
|
||||
1. In `Fine Grain SAML Endpoint Configuration`, set `Logout Service Redirect Binding URL`
|
||||
to the same value you provided for `SSO URL` above.
|
||||
1. Add the IdP's `Redirect Binding URL`for `SingleLogoutService` to
|
||||
1. Add the IdP's `Redirect Binding URL` for `SingleLogoutService` to
|
||||
your IdP configuration dict in `SOCIAL_AUTH_SAML_ENABLED_IDPS` in
|
||||
`/etc/zulip/settings.py` as `slo_url`. For example it may look like
|
||||
this:
|
||||
|
||||
@@ -568,7 +568,7 @@ Apache requires you use the hostname, not the IP address; see
|
||||
### HAProxy configuration
|
||||
|
||||
Below is a working example of a HAProxy configuration. It assumes that
|
||||
your Zulip server sits at `https://10.10.10.10:443`see
|
||||
your Zulip server sits at `https://10.10.10.10:443`; see
|
||||
[above](#configuring-zulip-to-allow-http) to switch to HTTP.
|
||||
|
||||
1. Follow the instructions to [configure Zulip to trust
|
||||
|
||||
Reference in New Issue
Block a user